Ask Other Engineering Expert

A low cost DIY wireless security system enables a homeowner to install the system without running cables around their house. It consists of a mains-powered (and battery-backed-up) control panel with a simple keypad, built-in sounder, LCD output display, and voice dialler. Battery powered wireless PIR sensors and a wireless alarm siren are also included in the package.

When the system is first installed (and at any future change), the homeowner can configure the system via its control panel. This configuration process involves 3 stages - pairing devices, assigning an emergency contact number, and setting a secret PIN:

1. The homeowner "pairs" all of the wireless sensors and alarm siren with the control panel, assigning each a zone number and optional description text. The user selects pairing mode, and then selects either a zone number, or the wireless siren. If they select a zone number, they can (optionally) enter additional descriptive text via the keypad, and then confirm. The pair operation then begins.

For each pair operation/zone number, the control panel broadcasts a pair request on the sensor frequency for 60 seconds.

The user then presses the "pair" button on the appropriate sensor or siren the user wants to assign, which causes the device to respond to the "pair" broadcast and identify itself to the control panel. If no devices respond in the 60 seconds, the panel returns to configuration mode.

If a device is successfully paired, the panel stores this zone data (number and description) along with a unique key for each device in onboard non-volatile memory. This allows the control panel to communicate securely with each peripheral individually by sending and receiving data as follows:

2. The homeowner can then enter an emergency contact number, which is also stored in the panel's onboard non-volatile memory.

3. Finally, the homeowner must programme a secret PIN which is used to arm and disarm the system. This is also stored in the panel's onboard non-volatile memory.

The PIR sensors, once paired, only transmit in the following circumstances to save power, and are otherwise idle:

1. If they detect motion, they send the encrypted data key to the control panel identifying themselves and a special code to indicate they have detected motion.

2. If they detect their batteries are running low, they send the unique encryption key and a special code to indicate the low battery state.

When the system is operating, its normal state is idle/disarmed. The panel display shows "Ready". During idle mode, the control panel will only display a different message if it receives a battery low message from a sensor. This message will identify the zone number (and description if available) with the low battery status. It will also "chirp" its internal sounder once every 5 minutes to alert the user. The user can acknowledge this alert with the keypad, which will stop the regular chirping.

When the user enters their secret PIN, they are prompted to confirm that they wish to arm the system. If they do, the system enters armed mode. The control panel displays "Armed". During armed mode, if the system receives a PIR motion message, it will enter alarm mode.

During alarm mode, it will display "ALARM!" on its LCD, sound its built-in sounder and will instruct the wireless siren to sound by sending it an encrypted "alarm sound" signal.

The wireless siren will sound for 15 minutes and then automatically silence itself, unless it receives an encrypted "alarm stop" signal from the panel in the meantime - in which case it will stop sounding immediately.

If the system continues in alarm mode for 90 seconds without being disarmed, the panel dials the stored emergency number and plays an automated message. If the connection fails (e.g. line busy, no dialtone), the number is redialled every 20 seconds until a connection is made (or the alarm is cancelled)

During alarm mode, if the secret PIN is entered, the system disarms and displays zone information about the zone that caused the alarm on the panel. It then returns to idle mode.

Apply the Requirements and Architecture Models to perform the analysis and design of the alarm control software described above (you can make - and should document

- necessary assumptions), and document all results obtained from each of the following tasks:

(1) Define the data and control context diagrams of the alarm control firmware.

(2) Define data flow diagram DFD 0 which shows at least four different processes, and its corresponding control flow diagram CFD 0.

(3) Define process and control specifications based on DFD 0 and CFD 0 produced in (2); the latter including any timing specification deemed necessary.

(4) Enhance the diagram DFD 0 produced in (2).

(5) Define architecture flow diagram AFD 0.

(6) Define the traceability matrix.

Other Engineering, Engineering

  • Category:- Other Engineering
  • Reference No.:- M91584604
  • Price:- $180

Guranteed 48 Hours Delivery, In Price:- $180

Have any Question?


Related Questions in Other Engineering

Register design a cpu register is simply a row of

Register design A CPU register is simply a row of flip-flops (i.e. SR, JK, T, etc) put side by side in an array to make the size of register required. For example, an 8 bit register has 8 flip-flops side by side for stor ...

A detailed review of spatial modulation and simulation

A Detailed Review of Spatial Modulation and Simulation Learning Outcomes a. Learn how to model mobile communication channels d. Discern knowledge development and directions on the recent advances in 4G to the research pr ...

Mine safety amp environmental engineering assignment -part

Mine Safety & Environmental Engineering Assignment - Part 1 - Questions 1. Occupational health and safety is the primary factor that needs to be considered in the mining industry. Discuss this statement. 2. Define the fo ...

Projectflow processing of liquor in a mineral refining

Project Flow Processing of Liquor in a Mineral Refining Plant The aim of this project is to design a flow processing system of liquor (slurry) in a mineral (aluminum) refining plant. Aluminum is manufactured in two phase ...

Learning outcomes evaluate multiuser communication and

Learning Outcomes Evaluate multiuser communication and resource sharing techniques; Apply the techniques of, and report on, digital communication applications using Matlab and hardware devices. Assignment Description The ...

Operations engineering assignment -please select only one

Operations Engineering Assignment - Please select only one of the following case studies for your assignment: CASE A. Tesla Motors Tesla is an innovative manufacturer that designs, assemble and sells fully electric vehic ...

Select a risk problem from the list below and prepare a

Select a risk problem from the list below and prepare a risk management plan in accordance with AS/NZS ISO 31000:2009. Please ensure that: - Establish the context clearly, in accordance with the Standard; - Define your s ...

Engineering materials term paper assignment -conduct a

ENGINEERING MATERIALS TERM PAPER ASSIGNMENT - Conduct a thorough literature search and write a 15-20 page technical review paper on the evolution of the engineering materials used in the manufacturing of any one of the f ...

Task 1using the lab kit design a circuit for the processor

Task 1: Using the lab kit, design a circuit for the processor to control the output of a connected 7-segment LED display device. You will be provided with a standard common anode 7-segment display of the type FND-507 (or ...

Control theory - lab reportsfor experiments 1 to 4 you must

Control Theory - Lab Reports For experiments 1 to 4 you must undertake the following: a) At the start of each section (including the pre-lab activities) there are a number learning outcomes. That is, what students should ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As